Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Full Access
Question # 5

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

A.

Variable

B.

Vector

C.

Constant

D.

Array

Full Access
Question # 6

Which of the following can transmit graphics but not sound?

A.

HDMI

B.

FireWire

C.

VGA

D.

DisplayPort

Full Access
Question # 7

Which of the following best describes the process of comparing MD5 values after downloading software?

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Full Access
Question # 8

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032

B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032

C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2

D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2

Full Access
Question # 9

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Full Access
Question # 10

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Full Access
Question # 11

Which of the following would be used to send messages using the SMTP protocol?

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Full Access
Question # 12

Which of the following storage types presents the most likely security risk?

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Full Access
Question # 13

A user logs into a laptop using a username and complex password. This is an example of:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Full Access
Question # 14

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Full Access
Question # 15

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 16

Which of the following is an example of structured data?

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Full Access
Question # 17

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Full Access
Question # 18

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Full Access
Question # 19

To establish a theory of probable cause, one technician investigates network issues in the server room while

another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies

is being performed?

A.

QUESTION NO: the obvious.

B.

Divide and conquer.

C.

Duplicate the problem

D.

Research the knowledge base.

Full Access
Question # 20

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Full Access
Question # 21

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Full Access
Question # 22

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Full Access
Question # 23

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Full Access
Question # 24

Which of the following best describes the differences between data and information?

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Full Access
Question # 25

Which of the following would indicate the FASTEST processor speed?

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Full Access
Question # 26

Which of the following BEST describes the physical location of the data in the database?

A.

Table

B.

Column

C.

RAM

D.

HDD

Full Access
Question # 27

Which of the following storage devices have a spinning disk? (Choose two.)

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Full Access
Question # 28

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?

A.

Compression

B.

Encryption

C.

Journaling

D.

Formatting

Full Access
Question # 29

Which of the following requires the MOST frequent updating to remain effective?

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Full Access
Question # 30

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

A.

Implement the solution.

B.

Document lessons learned.

C.

Establish a plan of action.

D.

Verify full system functionality.

Full Access
Question # 31

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Full Access
Question # 32

Which of the following is an example of a query language?

A.

C++

B.

Python

C.

XML

D.

SQL

Full Access
Question # 33

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 34

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Full Access
Question # 35

Which of the following data types would be best for storing data representing a phone number?

A.

String

B.

Integer

C.

Float

D.

Char

Full Access
Question # 36

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access
Question # 37

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Full Access
Question # 38

Which of the following would be the most secure password reset process?

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Full Access
Question # 39

Which of the following security concerns is a threat to confidentiality?

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Full Access
Question # 40

Given the following pseudocode:

Which of the following is the output of the code?

A.

1

B.

9

C.

10

D.

11

Full Access
Question # 41

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Full Access
Question # 42

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

A.

Record

B.

Report

C.

Column

D.

Procedure

Full Access
Question # 43

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Full Access
Question # 44

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Full Access
Question # 45

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Full Access
Question # 46

Which of the following statements BEST describes binary?

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Full Access
Question # 47

Which of the following OS features would be best to use to remove unnecessary programs?

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Full Access
Question # 48

A UPS provides protection against:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Full Access
Question # 49

Which of the following language types would a web developer MOST likely use to create a website?

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Full Access
Question # 50

Which of the following is a compiled language?

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Full Access
Question # 51

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Full Access
Question # 52

Which of the following is the equivalent of 1 KB?

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Full Access
Question # 53

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Full Access
Question # 54

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Full Access
Question # 55

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

A.

Input

B.

Output

C.

Storage

D.

Processing

Full Access
Question # 56

Which of the following language types most likely controls the way a web page looks?

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Full Access
Question # 57

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Full Access
Question # 58

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 59

Which of the following would work BEST stored as a flat file rather than stored in a database?

A.

Contact list

B.

Movie theater locations

C.

Directions to doctor’s office

D.

Store inventory

Full Access
Question # 60

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Full Access
Question # 61

Which of the following are the primary functions of an operating system? (Choose two.)

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Full Access
Question # 62

Which of the following would most likely be used to verify a user is following an AUP?

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Full Access
Question # 63

Which of the following business continuity concepts is the best example of fault tolerance?

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Full Access
Question # 64

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.

10

B.

14

C.

15

D.

17

Full Access
Question # 65

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Full Access
Question # 66

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Full Access
Question # 67

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Full Access
Question # 68

Which of the following would be the most cost-effective method to increase availability?

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Full Access
Question # 69

Which of the following describes a unique entry to a data set?

A.

Schema

B.

Record

C.

Column

D.

Index

Full Access
Question # 70

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Full Access
Question # 71

Which of the following BEST describes an application running on a typical operating system?

A.

Process

B.

Thread

C.

Function

D.

Task

Full Access
Question # 72

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Full Access
Question # 73

The computer language that is closest to machine code is:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Full Access
Question # 74

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Full Access
Question # 75

Privacy expectations on a company intranet should be limited to:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Full Access
Question # 76

Which of the following notational systems does the value 10AF01 indicate?

A.

Unicode

B.

Binary

C.

Hexadecimal

D.

Octal

Full Access
Question # 77

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Full Access
Question # 78

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 79

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 80

Which of the following would MOST likely use an ARM processor?

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Full Access
Question # 81

Which of the following file extensions is used for a consolidated group of files?

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Full Access
Question # 82

A network administrator wants to keep track of all system messages and alerts. Which of the following would best allow for the administrator to follow trends?

A.

Logs

B.

Scheduled tasks

C.

Systems management console

D.

Systems notification tool

Full Access
Question # 83

Which of following PC components operates only as an input device?

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Full Access
Question # 84

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Full Access
Question # 85

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 86

Which of the following does a NoSQL database use to organize data?

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Full Access